]]>
2011-10-26T19:53:15Z2011-10-26T19:53:15Ztag:www.schneier.com,2011:/blog//2.4086-comment:613338Comment from anonymous coward on 2011-10-26anonymous coward
It was a dark and stormy night...]]>
2011-10-26T19:42:59Z2011-10-26T19:42:59Ztag:www.schneier.com,2011:/blog//2.4086-comment:613260Comment from Love Poems to Ginsberg on 2011-10-26Love Poems to Ginsberg
He also has a fistfight with a terrorist trying to detonate a nuclear device at the very top of one of the Golden Gate Bridge's towers. One of the better unintentional comedies since Beck's "don't tease the panther" snoozefest.]]>
2011-10-26T15:35:41Z2011-10-26T15:35:41Ztag:www.schneier.com,2011:/blog//2.4086-comment:613251Comment from Stupid Security Questions on 2011-10-26Stupid Security Questionshttp://stupidsecurityquestions.blogspot.com/
@Dave: Digital Fortress was a nice turn-your-brain-off read for me the first time through, but I couldn't even get past the first few pages when trying to re-read it. Other websites have pointed out all the factual and even logical errors in it so I won't bother summarizing them but it was just painful.
]]>
2011-10-26T14:56:33Z2011-10-26T14:56:33Ztag:www.schneier.com,2011:/blog//2.4086-comment:613211Comment from GrammarNazi on 2011-10-26GrammarNazi
Spell check, please.]]>
2011-10-26T13:24:38Z2011-10-26T13:24:38Ztag:www.schneier.com,2011:/blog//2.4086-comment:613199Comment from Dave (again) on 2011-10-26Dave (again)
@David
"[A] Twofish algorithm"?

Indeed. Surely it should be The Twofish algorithm.

That's the trouble with putting crypto in a thriller. You have to know what you're talking about.

Case in point: Digital Fortress by Dan Brown. One or two teensy-weensy mistakes! Although I did enjoy it when hyper-intelligent Susan Fletcher almost fell out of her chair with surprise.

]]>
2011-10-26T12:35:43Z2011-10-26T12:35:43Ztag:www.schneier.com,2011:/blog//2.4086-comment:613197Comment from Dave on 2011-10-26Dave
"No one would be listening in."

Ah, but if you put the two fish in your ears, everything is translated perfectly.

]]>
2011-10-26T12:26:39Z2011-10-26T12:26:39Ztag:www.schneier.com,2011:/blog//2.4086-comment:613170Comment from Natanael L on 2011-10-26Natanael Lhttp://natanael.posterous.com/
@W Ricker: Isn't that the one that was thought to be jibberish?]]>
2011-10-26T10:34:22Z2011-10-26T10:34:22Ztag:www.schneier.com,2011:/blog//2.4086-comment:613039Comment from David on 2011-10-25David
"[A] Twofish algorithm"?]]>
2011-10-26T02:45:47Z2011-10-26T02:45:47Ztag:www.schneier.com,2011:/blog//2.4086-comment:613008Comment from Gabriel on 2011-10-25Gabriel
Since we are on the topic of Michael Savage, does anyone know what his take on encryption is? Does he demonize it as a tool to enable drug dealers and terrorists to hide their evil deeds from law enforcement? Or does he understand how it is important for privacy and security?]]>
2011-10-26T01:24:50Z2011-10-26T01:24:50Ztag:www.schneier.com,2011:/blog//2.4086-comment:612993Comment from W Ricker on 2011-10-25W Ricker
Cryptanalysis on actual historic document succeeds
"Computer Scientist Cracks Mysterious 'Copiale Cipher'"http://www.sciencedaily.com/releases/2011/10/111025102320.htm
=> http://stp.lingfil.uu.se/~bea/copiale/ ]]>
2011-10-26T00:35:09Z2011-10-26T00:35:09Ztag:www.schneier.com,2011:/blog//2.4086-comment:612977Comment from pfogg on 2011-10-25pfogg
@Dirk Praet

Wouldn't that be steganography? An encrypted cell phone...maybe one that opens like a Chinese puzzle-box?

]]>
2011-10-25T23:56:42Z2011-10-25T23:56:42Ztag:www.schneier.com,2011:/blog//2.4086-comment:612962Comment from Jan Schejbal on 2011-10-25Jan Schejbalhttp://janschejbal.wordpress.com
No one would be listening in. Or so they thought. Unknown to them, all their communication was being recorded and analyzed using a simple Man-in-the-middle attack, thanks to the stupid fact that they forgot to implement any kind of authentication for the Diffie-Hellman exchange.]]>
2011-10-25T22:36:52Z2011-10-25T22:36:52Ztag:www.schneier.com,2011:/blog//2.4086-comment:612958Comment from Chris S on 2011-10-25Chris S
@lazlo

I wonder what an encrypted cell phone would look like. Maybe whe should tip off the TSA that anyone observed at an airport holding a banana to his ear may actually be a high-tech terrorist. As most of them should be familiar with the legendary Sesame Street Bert and Ernie banana scenes, I have little doubt they'll buy it immediately.

]]>
2011-10-25T22:07:34Z2011-10-25T22:07:34Ztag:www.schneier.com,2011:/blog//2.4086-comment:612941Comment from Gabriel on 2011-10-25Gabriel
Unfortunately, if Michael Savage's program were encrypted with ten different twofish keys, I'm afraid the hate will still leak out of the ciphertext.

Regarding encrypting a physical product, I'm sure we'll see that happen soon, in the form of copy protection against 3D printers. You will probably see a DRM path between PC and printer, and of course, scrambling of physical objects to make them harder to scan a 3D model.

]]>
2011-10-25T21:27:10Z2011-10-25T21:27:10Ztag:www.schneier.com,2011:/blog//2.4086-comment:612925Comment from Paula Product on 2011-10-25Paula Product
"The cell phones were encrypted using a Twofish algorithm and a 4096-bit Diffie-Hellman key exchange. No one would be listening in."

If only a similar process were applied to Michael Savage's radio program...

]]>
2011-10-25T20:57:08Z2011-10-25T20:57:08Ztag:www.schneier.com,2011:/blog//2.4086-comment:612911Comment from Chris on 2011-10-25Chris
But how big was the symmetric key? ]]>
2011-10-25T20:45:27Z2011-10-25T20:45:27Ztag:www.schneier.com,2011:/blog//2.4086-comment:612900Comment from Clive Robinson on 2011-10-25Clive Robinson
@ Lazlo,

"I've developed a thermite-based physical device hashing function..."

Sounds like a hot pick product...

]]>
2011-10-25T20:20:20Z2011-10-25T20:20:20Ztag:www.schneier.com,2011:/blog//2.4086-comment:612895Comment from Emile Berliner on 2011-10-25Emile Berliner
"No one would be listening in"

One of these days someone will invent a device that can pick up audible communications.

I suppose someday when matter transmission is invented, it's going to be a necessity...

]]>
2011-10-25T19:34:13Z2011-10-25T19:34:13Ztag:www.schneier.com,2011:/blog//2.4086-comment:612870Comment from E on 2011-10-25E
4096? Why so many?]]>
2011-10-25T19:08:00Z2011-10-25T19:08:00Ztag:www.schneier.com,2011:/blog//2.4086-comment:612867Comment from Ido on 2011-10-25Ido
Actually the link you gave (at amazon) shows a preview - up to where it is mentioned... click the "look inside" (the book image) and scroll.

I can send a screen capture if you want.

]]>
2011-10-25T18:55:15Z2011-10-25T18:55:15Ztag:www.schneier.com,2011:/blog//2.4086-comment:612865Comment from Pete on 2011-10-25Petehttp://www.peteonsoftware.com/
In case at some point in the future, those links aren't available, the referenced text is: "The line was picked up after three rings. The cell phones were encrypted using a Twofish algorithm and a 4096-bit Diffie-Hellman key exchange. No one would be listening in."]]>
2011-10-25T18:48:55Z2011-10-25T18:48:55Ztag:www.schneier.com,2011:/blog//2.4086-comment:612860Comment from j on 2011-10-25j
try this link, wait a moment for the book to open, last page of the sample:http://www.amazon.com/exec/obidos/ASIN/0312651619/counterpane/#reader_B004TLHPYU]]>
2011-10-25T18:33:38Z2011-10-25T18:33:38Ztag:www.schneier.com,2011:/blog//2.4086-comment:612856Comment from James Howard on 2011-10-25James Howardhttp://www.jameshoward.us
Page from Google Books: